CVE-2017-2611

MEDIUM

Jenkins <2.44, 2.32.2 - Privilege Escalation

Title source: llm
STIX 2.1

Description

Jenkins before versions 2.44, 2.32.2 is vulnerable to an insufficient permission check for periodic processes (SECURITY-389). The URLs /workspaceCleanup and /fingerprintCleanup did not perform permission checks, allowing users with read access to Jenkins to trigger these background processes (that are otherwise performed daily), possibly causing additional load on Jenkins master and agents.

Scores

CVSS v3 4.3
EPSS 0.0029
EPSS Percentile 52.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Details

CWE
CWE-358 CWE-863
Status published
Products (5)
jenkins/jenkins < 2.32.2
jenkins/jenkins < 2.44
org.jenkins-ci.main/jenkins-core 0 - 2.44Maven
redhat/openshift 2.0
redhat/openshift 3.0
Published May 08, 2018
Tracked Since Feb 18, 2026